Quantum distance bounding

9Citations
Citations of this article
10Readers
Mendeley users who have this article in their library.
Get full text

Abstract

We present a distance bounding (DB) protocol that employs quantumbits (qubits) in the implementation of the rapid-bit exchange (a.k.a., challenge-response) phase, instead of classical bits. This is not the first attempt at using qubits in a DB protocol, as Abidin et al. proposed a way to implement DB protocols using qubits in RFIDSec 2016 [1]. We improve upon Abidin et al.'s protocol and make it resistant to photon number splitting attacks. In addition, our new protocol eliminates the need for communication from the prover to the verifier in the last authentication phase, which is necessary in the protocol by Abidin et al.

Cite

CITATION STYLE

APA

Abidin, A. (2019). Quantum distance bounding. In WiSec 2019 - Proceedings of the 2019 Conference on Security and Privacy in Wireless and Mobile Networks (pp. 233–238). Association for Computing Machinery, Inc. https://doi.org/10.1145/3317549.3323414

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free